39

Kevin wharram

Embed Size (px)

DESCRIPTION

This presentation covers virtualization and private cloud security

Citation preview

Page 1: Kevin wharram
Page 2: Kevin wharram

Welcome

Kevin Wharram, CISSP, CISM, CEH, EnCE, GCFA, 27001 Lead Auditor

Member of the ISACA Security Advisory Group at ISACA London Chapter

My interests are in – Forensics, Virtualization and Cloud Security

2

Page 3: Kevin wharram

3

What is Virtualization? Server Virtualization Analogy Virtualization Security Virtualization Compliance What is Cloud Computing? What is a Private Cloud? Private Cloud Security

Agenda

3

Page 4: Kevin wharram

What is Virtualization?

Virtualization is the creation of a virtual (rather than actual) version of something, such as an operating system (OS), a server, a storage device or network resource.Source - http://en.wikipedia.org/wiki/Virtualization

4

Page 5: Kevin wharram

What is Virtualization cont.

Virtualization presents hardware resources as virtual resources:•CPU•Memory•Storage (Disk)•Network Interface (NIC)

5

Page 6: Kevin wharram

• Not a new concept• First developed in the 1960s and was

better known as time-sharing• IBM developed the idea of a Virtual

Machine Monitor (VMM) which is also know as a Hypervisor

History of Virtualization

6

Page 7: Kevin wharram

• Server Virtualization• Desktop Virtualization or (VDI)• Application Virtualization• Network Virtualization• Storage Virtualization

Types of Virtualization

7

Page 8: Kevin wharram

Server Virtualization

8

Page 9: Kevin wharram

What is Server Virtualization?• Encapsulate OS and present “virtual

hardware”• Run many OS on single hardware platform• Consolidate underutilized servers• VMware (vSphere), Microsoft (Hyper-V),

Citrix (XenServer) and Solaris Containers

9

Page 10: Kevin wharram

Server Virtualization Analogy

HotelVSHoliday Home

10

Page 11: Kevin wharram

Copyright © 2004 VMware, Inc. All rights reserved.

Traditional Server

Server without Virtualization

Holiday Home

11

Page 12: Kevin wharram

Virtualized Server Hotel

Server with Virtualization

12

Page 13: Kevin wharram

Desktop Virtualization

13

Page 14: Kevin wharram

What is Desktop Virtualization?

• Desktop virtualization separates a personal computer desktop environment from a physical machine using a client–server model of computing

• Desktop virtualization is sometimes referred to as Virtual Desktop Infrastructure (VDI)

14

Page 15: Kevin wharram

What is Desktop Virtualization cont.

• Remote Desktop (RDS) is different to VDI

• With (RDS), all users are sharing the same OS. With VDI, each user has their own real OS (could be dedicated or from a pool)

• VMware View, Citrix (XenDesktop) and Kaviza

15

Page 16: Kevin wharram

Application Virtualization

16

Page 17: Kevin wharram

What is Application Virtualization?

• Encapsulate applications (run conflicting applications on same system, i.e. IE 7 and IE8)

• Avoid apps corrupting (OS)

• Application delivery (Stream, ESD, Other)

• VMware (ThinApp), Microsoft (App-V) and Citrix ( XenApp)

17

Page 18: Kevin wharram

Network Virtualization

18

Page 19: Kevin wharram

What is Network Virtualization?• Network virtualization is a method used to

combine computer network resources into a single platform, known as a virtual network

• Not a new concept• Virtual private networks (VPNs) are widely

used • Virtual Local Area Networks (VLANs) are a

form of network virtualization

19

Page 20: Kevin wharram

Physical Network

20

Page 21: Kevin wharram

VMware Virtual Network

21

Page 22: Kevin wharram

Storage Virtualization

22

Page 23: Kevin wharram

What is Storage Virtualization?• Storage virtualization is the amalgamation

of multiple network storage devices into what appears to be a single storage unit. Storage virtualization is often used in SAN (storage area networks).

Source http://www.webopedia.com/TERM/S/storage_virtualization.html

23

Page 24: Kevin wharram

Virtualization Security

24

Page 25: Kevin wharram

ESG Research indicates that security professionals lack virtualization knowledge and best practice models for server virtualization security.

Gartner survey: “40% of virtualization deployment projects were undertaken without involving the information security team in the initial architecture and planning stages.”

Gartner analyst Neil MacDonald wrote: “Virtualization is not inherently insecure. However, most virtualized workloads are being deployed insecurely.“

25

Industry Comments

Page 26: Kevin wharram

Virtualization Security Benefits

• Patching

• Disaster Recovery

• Investigation

• Forensics

26

Page 27: Kevin wharram

Virtualization Security Issues

• Virtual environment misconfiguration

• Processes

• Lack of Controls

• Access Controls

• Software Vulnerabilities

• Malware

27

Page 28: Kevin wharram

VMware vSphere Security

• vCenter

• Networking, vSwitches, Cisco Nexus 1000v, vLANs

• Storage• Logging

• Monitoring

28

Page 29: Kevin wharram

Virtualization Compliance

29

Page 30: Kevin wharram

Compliance Issues

• New technologies introduce new components and processes causing conflict with standards and policies

• Internal policies and standards need to be updated to reflect virtualization technology

• Industry standards, PCI DSS, HIPA, etc, sometimes lag technology

30

Page 31: Kevin wharram

Controls

Policies & Compliance

Processes&

Standards

Compliance Pyramid

31

Page 32: Kevin wharram

Cloud Computing

32

Page 33: Kevin wharram

What is Cloud Computing?

Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.Source - http://www.nist.gov/itl/cloud/index.cfm

33

Page 34: Kevin wharram

• Private cloud• Public cloud• Community cloud• Hybrid cloud

Types of Cloud Computing

34

Page 35: Kevin wharram

What is a Private Cloud?

• Operated solely for an organization

• May be managed by the organization or a third party

• May exist on-premise or off-premise

35

Page 36: Kevin wharram

Private Cloud Security

Most of the virtualization controls that we spoke about earlier, would apply to the Private Cloud as you control the “Private Cloud.”

36

Page 37: Kevin wharram

Controls

OrganisationDue-Diligence

Processes&

Standards

Compliance Pyramid

37

Page 38: Kevin wharram

ResourcesNIST guide to Security for Full Virtualization Technologieshttp://csrc.nist.gov/publications/nistpubs/800-125/SP800-125-final.pdf

VMware hardening guides http://blogs.vmware.com/security/2010/04/vsphere-40-hardening-guide-released.html

Cloud Security Alliancehttp://www.cloudsecurityalliance.org/

NIST Definition of Cloud Computing http://www.nist.gov/itl/cloud/index.cfm

Center for Internet Security (CIS) Benchmarks on Server Virtualizationhttp://cisecurity.org/en-us/?route=downloads.benchmarks

Defense Information System Agency (DISA)http://iase.disa.mil/stigs/index.html

38

Page 39: Kevin wharram

Questions?

Kevin [email protected]

39